Self-Destructing Scheme in Cloud Computing for Data Security

Authors

  • Sangita B. Chavan Raisoni College of Engineering, Ahmednagar, Savitribai Phule Pune University, India Author
  • Ashish Kumar G.H. Raisoni COE, Ahmednagar, Savitribai Phule Pune University, India Author

DOI:

https://doi.org/10.14741/

Keywords:

Sensitive Data, Cloud Computing, privacy-preserving, fine-grained access control

Abstract

Cloud computing have been playing very vital role in the rapidly growing organizations. It becomes mostly susceptible to use cloud services to share data between organizations, electronic businesses and a friend circle in the cloud computing environment. Because of the fastest development in electronic business by using the various cloud services, it is very difficult to provide full lifecycle privacy security and access control becomes a very tedious task, specifically when sharing the sensitive data on cloud servers for achieving the anytime, anywhere service for authentic person or organization. Also for sharing purpose we need efficient method and secure technique over cloud services. In order to grab this problem the key-policy attribute-based encryption with time-specified attributes KP-TSABE, which is focus on data security over specific time period and proposed new proxy re-encryption technique for providing full lifecycle privacy security solution(Jinbo Xiong et al, 2014). We predict that fast and secure re-encryption will become increasingly popular as a method for managing encrypted file systems in which new re-encryption schemes that realize a stronger notion of security.

References

Downloads

Published

2016-02-29

Issue

Section

Articles

How to Cite

Self-Destructing Scheme in Cloud Computing for Data Security. (2016). International Journal of Current Engineering and Technology, 6(1), 37-39. https://doi.org/10.14741/